36:
140:
149:
305:
where more experienced users can help decipher which entries need to be removed. Automated tools also exist that analyze saved logs and attempt to provide recommendations to the user, or to clean entries automatically. Use of such tools, however, is generally discouraged by those who specialize in
297:
logfile detailing all entries it finds, and some entries can be fixed by HijackThis. Inexperienced users are advised to exercise caution or seek help when using the latter option. Except for a small whitelist of known safe entries, HijackThis does not discriminate between legitimate and unwanted
277:
of known spyware. HijackThis is used primarily for diagnosis of malware, not to remove or detect spyware—as uninformed use of its removal facilities can cause significant software damage to a computer. Browser hijacking can cause malware to be installed on a computer.
324:
HijackThis reached end-of-life in 2013 and is no longer developed. However, the team has recommended an unofficial replacement called HijackThis+ (originally called HijackThis Fork) that is being developed by
Stanislav Polshyn.
306:
manually dealing with HijackThis logs: they consider the tools dangerous for inexperienced users, and neither accurate nor reliable enough to substitute for consulting with a trained human analyst.
298:
items. HijackThis attempts to create backups of the files and registry entries that it fixes, which can be used to restore the system in the event of a mistake.
365:
490:
273:. The program is notable for quickly scanning a user's computer to display the most common locations of malware, rather than relying on a
485:
119:
480:
495:
57:
50:
100:
72:
175:
281:
On
February 16, 2012, Trend Micro released the HijackThis source code as open source and it is now available on the
475:
231:
79:
470:
369:
86:
46:
390:
68:
262:
213:
318:
266:
206:
226:
201:
93:
302:
464:
310:
408:
282:
270:
164:
35:
17:
314:
294:
159:
139:
428:
274:
453:
345:
218:
148:
242:
433:
269:. It was originally created by Merijn Bellekom, and later sold to
309:
Later versions of HijackThis include such additional tools as a
29:
394:
238:
225:
212:
200:
174:
158:
340:
338:
8:
132:
131:
301:A common use is to post the logfile to a
120:Learn how and when to remove this message
346:"HijackThis project site at SourceForge"
334:
56:Please improve this article by adding
265:tool to detect malware and adware on
7:
243:http://sourceforge.net/projects/hjt
25:
27:Malware and adware detection tool
147:
138:
34:
181:2.0.5 / May 18, 2013
391:"HijackThis log analyzer site"
1:
491:Formerly proprietary software
58:secondary or tertiary sources
153:HijackThis 2.0.2 screenshot
512:
486:Windows-only free software
366:"Trend Micro Announcement"
293:HijackThis can generate a
232:GNU General Public License
196:
170:
146:
137:
409:"Computer Hope log tool"
481:Free security software
183:; 11 years ago
45:relies excessively on
496:Discontinued software
319:alternate-data-stream
429:"HiJackThis Fork v3"
263:free and open-source
134:
437:. 14 October 2021.
476:Portable software
267:Microsoft Windows
248:
247:
207:Microsoft Windows
130:
129:
122:
104:
16:(Redirected from
503:
457:
456:
454:Official website
439:
438:
425:
419:
418:
416:
415:
405:
403:
402:
393:. Archived from
387:
381:
380:
378:
377:
368:. Archived from
362:
356:
355:
353:
352:
342:
202:Operating system
191:
189:
184:
151:
142:
135:
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
511:
510:
506:
505:
504:
502:
501:
500:
471:Spyware removal
461:
460:
452:
451:
448:
443:
442:
427:
426:
422:
413:
411:
407:
406:
400:
398:
389:
388:
384:
375:
373:
364:
363:
359:
350:
348:
344:
343:
336:
331:
317:editor, and an
291:
192:
187:
185:
182:
154:
126:
115:
109:
106:
63:
61:
55:
51:primary sources
39:
28:
23:
22:
18:Merijn Bellekom
15:
12:
11:
5:
509:
507:
499:
498:
493:
488:
483:
478:
473:
463:
462:
459:
458:
447:
446:External links
444:
441:
440:
420:
382:
357:
333:
332:
330:
327:
290:
287:
246:
245:
240:
236:
235:
229:
223:
222:
216:
210:
209:
204:
198:
197:
194:
193:
180:
178:
172:
171:
168:
167:
162:
156:
155:
152:
144:
143:
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
508:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
469:
468:
466:
455:
450:
449:
445:
436:
435:
430:
424:
421:
410:
397:on 2018-05-21
396:
392:
386:
383:
372:on 2012-03-02
371:
367:
361:
358:
347:
341:
339:
335:
328:
326:
322:
320:
316:
312:
307:
304:
299:
296:
288:
286:
284:
279:
276:
272:
268:
264:
260:
256:
252:
244:
241:
237:
233:
230:
228:
224:
220:
217:
215:
211:
208:
205:
203:
199:
195:
179:
177:
176:Final release
173:
169:
166:
163:
161:
157:
150:
145:
141:
136:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
53:
52:
48:
43:This article
41:
37:
32:
31:
19:
432:
423:
412:. Retrieved
399:. Retrieved
395:the original
385:
374:. Retrieved
370:the original
360:
349:. Retrieved
323:
311:task manager
308:
300:
292:
280:
258:
254:
250:
249:
160:Developer(s)
116:
107:
97:
90:
83:
76:
69:"HijackThis"
64:
44:
283:SourceForge
271:Trend Micro
221:diagnostics
165:Trend Micro
465:Categories
414:2010-02-02
401:2008-11-02
376:2012-02-20
351:2012-03-03
329:References
315:hosts-file
295:plain-text
255:HiJackThis
251:HijackThis
188:2013-05-18
133:HijackThis
80:newspapers
47:references
321:scanner.
234:version 2
275:database
110:May 2024
261:) is a
239:Website
227:License
219:Malware
186: (
94:scholar
434:GitHub
285:site.
253:(also
96:
89:
82:
75:
67:
303:forum
101:JSTOR
87:books
313:, a
214:Type
73:news
289:Use
259:HJT
257:or
49:to
467::
431:.
337:^
60:.
417:.
404:.
379:.
354:.
190:)
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
54:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.